mirror of https://gitlab.com/curben/blog
feat(threat-hunting): Veeam credential extraction
This commit is contained in:
parent
665846fa33
commit
a1a8f6c44b
|
|
@ -116,6 +116,7 @@ updated: 2025-08-03
|
|||
- [Unusual printui.exe path](unusual-printui-exe-path)
|
||||
- [User Login with Local Credentials](user-login-with-local-credentials)
|
||||
- [VSCode tunnel](vscode-tunnel)
|
||||
- [Veeam credential extraction](veeam-credential-extraction)
|
||||
- [Volt Typhoon IOC](volt-typhoon-ioc)
|
||||
- [Volume Shadow Copy](volume-shadow-copy)
|
||||
- [Volume Shadow Delete](volume-shadow-delete)
|
||||
|
|
|
|||
|
|
@ -0,0 +1,12 @@
|
|||
---
|
||||
title: Veeam credential extraction
|
||||
layout: page
|
||||
date: 2025-08-06
|
||||
---
|
||||
|
||||
References: [1](https://thedfirreport.com/2025/08/05/from-bing-search-to-ransomware-bumblebee-and-adaptixc2-deliver-akira/)
|
||||
SPL:
|
||||
|
||||
```spl
|
||||
| tstats summariesonly=true allow_old_summaries=true count FROM datamodel=Endpoint.Processes WHERE index="windows" Processes.process_name="psql.exe" Processes.process="*VeeamBackup*" Processes.process IN ("*password*", "*credentials*") BY index, host, Processes.signature_id, Processes.signature, Processes.parent_process, Processes.process, Processes.user, _time span=1s
|
||||
```
|
||||
Loading…
Reference in New Issue